@funkylab @pid_eins It really doesn't. IPC/RPC are bad (high risk) too just in different ways. The right ways to do this are gating access with basic unix permissions needed to access the request socket (or other trigger mechanism) or with ssh (where the problem has already been solved by experts and, in the absence of garbage like PAM, preauth RCE vulns essentially don't happen).